单选题 Brian is a researcher at a major university. As part of his research, he logs into a computing cluster hosted at another institution using his own university’s credentials. Once logged in, he is able to access the cluster and use resources based on his role in a research project, as well as using resources and services in his home organization. What has Brian’s home university implemented to make this happen?
布赖恩是一所重点大学的研究员。作为研究的一部分,他使用自己大学的证书登录到另一个机构托管的计算集群。登录后,他就可以访问集群并根据他在研究项目中的角色使用资源,以及使用他所在组织中的资源和服务。布莱恩的家乡大学采取了什么措施来实现这一目标?
相关试题
单选题 Place the following steps in the order in which they occur during the Kerberos authentica- tion process. 按照在 Kerberos 身份验证过程中发生的顺序放置以下步骤。
1)Client/server ticket generated 生成的客户端/服务器票证
2)TGT generated 生成的 TGT
3)Client/TGS key generated 生成的客户端/TGS 密钥
4)User accesses service 用户访问服务
5)User provides authentication credentials 用户提供身份验证凭据
单选题 Which of the following is not a weakness in Kerberos?
以下哪一项不是 Kerberos 的弱点?
单选题 If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct authentication factor types has she used?
如果 Susan 的组织要求她使用她的用户名、PIN、密码和视网膜扫描来登录,那么她使用了多少种不同的身份验证因素类型?
单选题 Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?
以下哪一项最能描述为关注主体并标识每个主体可以访问的客体的访问控制模型?
单选题 What major issue often results from decentralized access control?
去中心化访问控制通常会导致什么主要问题?
单选题 Voice pattern recognition is what type of authentication factor?
语音模式识别是什么类型的认证因素?
单选题 Charles wants to deploy a credential management system (CMS). He wants to keep the keys as secure as possible. Which of the following is the best design option for his CMS implementation?
Charles 想要部署凭证管理系统 (CMS)。他希望尽可能保证密钥的安全。以下哪一项是其 CMS 实施的最佳设计选项?
单选题 Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based appli- cations. Jim’s company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company’s on-site iden- tity needs?
Jim 在组织范围内实施的 IDaaS 为基于云的应用程序提供了广泛的支持。Jim 的公司没有内部身份管理人员,也不使用集中式身份服务。相反,他们依赖 Active Directory 提供 AAA 服务。Jim 应该推荐以下哪个选项来最好地处理公司的现场身份需求?